The world has become mobile. Working from the office is no longer the only option and being tethered to a desk is a thing of the past. Mobile phones, tablets, and laptops allow anyone to work from anywhere. Whether at home, in a coffee shop, or even on a plane, the office is now wherever you happen to be sitting.

Of course from time to time even the most nomadic employee must stop by the office and catch up. In most cases this will include connecting a laptop to the network or a mobile device to the office Wi-Fi. Even in cases where corporations block external devices from connecting directly to the corporate network, VPN’s and even exchanging email can open conduits through which malware can make its way.

This adds a significant layer of complexity for management and IT departments everywhere. This is because it’s impossible to know what employees do with their tablets, phones, and laptops once they leave the office. Do they browse to questionable websites where malware may be lurking? Do they have security software installed and updated? Did they download an app that has hidden malicious code? And most importantly, do they keep their applications and operating systems patched and updated?

No matter what your situation and no matter what policies your organization has implemented, ultimately your devices are at risk and only you can protect them from criminal activity.

Fortunately, there are a number of things you can do to reduce the risk and keep your devices and your organizations network secure.

The following list, when followed, will greatly reduce your risk and keep your devices and your organizations network secure.

Make sure that you have anti-virus and anti-malware installed on all the devices you bring to the office. Set them to auto-update so you don’t have to worry about whether or not you have the latest versions. This really is your first line of defense in terms of software you can employ for keeping some dangerous stuff off your devices and off the company’s network.

Work together with management and IT to determine what access they will have to your device to make sure it’s not adding unnecessary risk to their systems. After all, if you are using their resources, it’s only fair that they be able to ensure their risk is the lowest it can be and still allow personal device access.

Stay tuned in to what cybersecurity risks exists for all your devices that you bring into the company. They do differ among smartphones, tablets, and laptops. They also are different based on what operating system is running on them. The threats also change from day to day and even hour to hour. Keep yourself aware of these and take what actions you can to avoid bringing them into the office.

Respect any bring your own device (BYOD) policies your company has in place. They are in place so that you can keep your devices and they can still protect the network. Use caution when browsing websites. Just briefly passing by a malicious site can wreak havoc on the corporate network.

Keep your mobile devices password protected when you are not using them. Be sure to use strong passwords or codes that are not easily guessed. Enable the automatic locking functionality so you don’t walk away and leave it unsecured.

Avoid using social media while connected to the corporate network. Cybercriminals continue to actively use social media and social networking sites for phishing and to distribute malware. A few years back, major software companies fell victim to an attack that allowed cybercriminals to gather information posted on social media to gain trust in employees. This ultimately allowed them to gain access to the corporate network while the employees were checking their accounts from the office.

Be sure to have a mechanism to automatically wipe the device in case it’s lost or stolen. It’s likely you will have it set up to get corporate email and/or check your calendar. If so, that’s a connection into your company and therefore, you need to be able to quickly clear the device of that link if it should go missing.

As always, be very aware of what you’re clicking and tapping on your devices. Once they are on the network, if malware is on your phone it can very quickly and without notice end up worming its way through the corporate systems.

It’s important to know that while these tips are useful, cybercriminals are always adapting. Ultimately it’s up to you to remain vigilant and remember that if something seems strange or you have even the slightest concern, stop and get help from management or your IT department. It is always better to be safe than sorry.

We use cookies to give you a more relevant browsing experience and improve our website. Using this site means that you agree with our use of cookies policy.

Chances are pretty good that you have heard the term business email compromise or BEC by now. It is a type of wire transfer fraud that the FBI has deemed one of the most prevalent types of scam going around these days. In 2017, there were over 15,690 complaints that resulted in total adjusted losses of more than $675 million. That is an 87% increase over 2016 and it is expected to continue to rise. The Identity Theft Resource Center (ITRC) reported that of the fraud related complaints reported in 2017, the most common type was wire transfer fraud.

Chances are pretty good that you have heard the term business email compromise or BEC by now. It is a type of wire transfer fraud that the FBI has deemed one of the most prevalent types of scam going around these days. In 2017, there were over 15,690 complaints that resulted in total adjusted losses of more than $675 million. That is an 87% increase over 2016 and it is expected to continue to rise. The Identity Theft Resource Center (ITRC) reported that of the fraud related complaints reported in 2017, the most common type was wire transfer fraud.

This Privacy Policy applies to and is provided on behalf of Stickley on Security. (collectively referred to as "We", "Us", or "Our") and describes Our information gathering
practices and policies in connection with this Site. We value your ("User", "You", or "Your") privacy and recognize the sensitivity of Your personal information. We are
committed to protecting Your personal information and using it only as appropriate to provide You with the best possible service, products, and opportunities. Use of this
Site constitutes consent to Our collection and use of personal data as outlined herein.

COLLECTION AND USE OF PERSONAL INFORMATION FROM SITE USERS

We collect personally identifiable information from Users who provide it to us for billing purposes. For example, We collect Your name, street address, city, state, zip
code, telephone number, email address, and financial information, such as a credit card number, if You use the Site to register or renew a license. We may use this
information to contact You regarding the status of Your account and orders placed, and to alert You to new information, products and services, events and other
opportunities. We recognize that You may wish to limit the ways in which You are contacted and provide You with opt-out options below. Information about Our experiences and
transactions with you, such as your payment history, types of services and/or products you purchased are not shared with organizations outside of Stickley on Security.

We will not disclose to third parties (that is, people and companies that are not affiliated with Us) individually identifying information, such as names, postal and e-mail
addresses, telephone numbers, and other personal information, except to the extent that it is necessary to process and provide You with Your order, license request or
other request. Your contact information may also be provided to the extent necessary to comply with applicable laws or legal processes (e.g., subpoenas), or to meet contractual obligations outlined in this policy, or to protect Our
rights or property. We will cooperate with all law enforcement authorities.

If Your order, license request or other request is processed by a third-party, or if You are provided with bulletin boards and chat rooms and/or email capabilities on
this Site, please note that in the event that You voluntarily disclose personally identifiable information in those instances, that information, along with any substantive
information disclosed in Your communication or post, can be collected, correlated and used by third parties. This may result in unsolicited messages from third parties. Such
activities are beyond Our control, and We encourage You to check the applicable privacy policy of such party when providing personally identifiable information.

For each visitor to this Site, Our server can detect and collect certain information, including the User's domain name and e-mail address, and can identify the Web pages the
User visited or accessed. We may use this information in order to measure interest in and use of the various areas of the site.

We do not knowingly solicit information from children and We do not knowingly market the Site or its services to children.

OPT-OUT

You may at any time opt out of having Your personal information used by Us to send You promotional correspondence by contacting Us via e-mail provided in the "Contact Us"
section below.

PROMOTION CODES

"Promotion codes" are offered by third-party affiliates of the Stickley on Security Training Videos. If you choose to include a "Promotion Code" when placing your order, the affiliate who is associated with that promotional code will receive your organizations name. They will NOT however receive any other information related to your account. The sharing of the organization name only applies when a "Promotion Code" is included during the order process.

USE OF COOKIES

1. First-party cookies
User input cookies to keep track of the user's input when filling online forms, shopping carts, etc., for the duration of a session, or persistent cookies limited to the duration of an operation such as purchase or trial;
User identification persistent cookies, to identify the user visited the website for the first time;
Authentication cookies, to identify the user once he has logged in, for the duration of a session;
user interface customization cookies such as time zone and shopping cart status info, for the duration of a session (or slightly longer).

2. Third-party cookies
social plug in content sharing cookies, for logged in members of a social network;
Google Analytics cookies to generate statistical data on how the visitor uses the website.

How do we use them?
Where strictly necessary. These cookies and other technologies are essential in order to enable the Services to provide the feature you have requested, such as remembering you have logged in.

For functionality. These cookies and similar technologies remember choices you make such as time zone and shopping cart info. We use these cookies to provide you with an experience more appropriate with your selections and to make your use of the Services more tailored.

For performance and analytics. These cookies and similar technologies collect information on how users interact with the Services and enable us to improve how the Services operate. For example, we use Google Analytics cookies to help us understand how visitors arrive at and browse our products, services and website to identify areas for improvement such as navigation, user experience, and marketing campaigns.

Social media cookies. These cookies are used when you share information using a social media sharing button or .like. button on our websites or you link your account or engage with our content on or through a social media site. The social network will record that you have done this. This information may be linked to targeting/advertising activities.

How can you opt-out?
To opt-out of our use of cookies, you can instruct your browser, by changing its options, to stop accepting cookies or to prompt you before accepting a cookie from websites you visit. If you do not accept cookies, however, you may not be able to use our Services.

Updates to this Cookie Policy
This Cookie Policy may be updated from time to time. If we make any changes, we will notify you by revising the "effective starting" date at the top of this notice.

INFORMATION SECURITY AND CONFIDENTIALITY

We maintain physical, electronic and procedural safeguards to prevent the unauthorized release of or access to Your personal information. When We transfer and receive
certain types of sensitive information such as financial information, We redirect visitors to a secure server. We do not store or reuse Your credit card information. We do
not record or manager financial information about You (including credit card and other payment information). However, such precautions do not guarantee that this Site is
invulnerable to all security breaks. We make no warranty, guarantee, or representation that the use of this Site is protected from viruses, security threats, or other
vulnerabilities and that Your information will always be secure. We cannot guarantee the confidentiality of any communication or material transmitted to/from Us via the Site
or e-mail. Use of the Internet is solely at Your own risk and is subject to all applicable local, state, federal, and international laws and regulations.

THIRD PARTY PROCESSING

Stickley on Security uses the vendor Authorize.net to process all payment transactions. When making a purchase on this site, You also accept the Terms and Conditions and
Privacy Policy of Authorize.net.

CONTACT US

This Privacy Policy may be updated periodically and posted on this Site. It applies only to Our online practices and does not encompass other areas of the organization. We
reserve the right to change this Policy at any time by posting revisions. By accessing or using the Site, You agree to be bound by all of the Terms of this Privacy Policy as
posted at the time of Your access or use. We reserve the right to contact Users of the Site regarding changes to the Terms and Conditions generally, this Privacy Policy
specifically, or any other policies or agreements relevant to the Site's Users. If You have any questions about this Policy, You may email to:

Keep up with the latest cyber security news through our weekly Fraud News & Alerts updates.
Each week you will receive an email containing the latest cyber security news, tips and breach notifications.

Simply complete the form below and you're all set.

You're all set!

You will receive your first official security update email within the next week.
A welcome email has also just been sent to you. If you do not receive this email within the next few minutes, please check your Junk box or spam filter to confirm our emails are not being blocked.